Okta customers’ data exposed in support system breach

October 23, 2023

Okta has disclosed that hackers gained access to its customer support management system, exposing sensitive data belonging to some customers.

The company said the threat actors were able to view files uploaded by certain Okta customers as part of recent support cases. These files may have contained sensitive data, including cookies and session tokens, that could be used to impersonate valid users.

Okta said it has worked with affected customers to investigate the incident and has taken measures to protect its customers, including the revocation of embedded session tokens. The company also recommends that customers sanitize all credentials and cookies/session tokens within a HAR file before sharing it.

Okta did not disclose how the hackers stole the credentials to its support system or whether access to the compromised system was protected by two-factor authentication.

Security firm BeyondTrust said it alerted Okta to suspicious activity earlier this month after detecting an attacker using a valid authentication cookie trying to access one of BeyondTrust’s in-house Okta administrator accounts. BeyondTrust’s access policy controls stopped the attacker’s initial activity, but limitations in Okta’s security model allowed them to perform a few confined actions. BeyondTrust was eventually able to block all access.

BeyondTrust said it notified Okta of the incident, but did not receive a response for more than two weeks.

The sources for this piece include an article in ArsTechnica.

Top Stories

Related Articles

March 5, 2026 Check Point Software on Wednesday launched a dedicated Canada data region for its CloudGuard Web Application Firewall more...

March 5, 2026 A small development company in Mexico says a compromised Google Cloud API key triggered more than $82,000 more...

March 2, 2026 Thousands of exposed Google Cloud API keys can authenticate to Gemini endpoints when the Generative Language API more...

March 2, 2026 Threat actors are exploiting Microsoft Entra ID through Open Authorization (OAuth) consent abuse, using seemingly legitimate third-party more...

Jim Love

Jim is an author and podcast host with over 40 years in technology.

Share:
Facebook
Twitter
LinkedIn